This dataset corresponds to the detected fractures characteristics related to the microseismic monitoring of a floating ice plate. This dataset is used in the manuscript submitted to JGR titled "Micro-seismic monitoring of a floating ice plate to characterize its deformation' by C. Lachaud, D. Marsan, M. Montagnat, J. Weiss, L. Moreau and F. Gimbert
>
...

Context These datasets were generated for the evaluation of cybersecurity measures in the context of industrial control systems (ICS). An ICS is a set of devices (electrical, mechanical, hydraulic,. . . ) whose interaction controls the behavior of a physical process in order to achieve an industrial objective (manufacturing, transportation of matter and energy, etc.). ICSs serve as the backbone of several critical infrastructures that provide facilities for the generation and distribution of ele
ctricity, water treatment and supply, railway transportation networks, and manufacturing applications. Due to their criticality, failures in these systems, whether of accidental or intentional origins, can lead to significant human and economic loss. The recent history of ICSs is that of an ever-growing convergence with classical information technology (IT) systems. In an effort to drive down costs and provide stakeholders, engineers and operators with seamless access to the industrial plants, ICSs are nowadays interconnected with the Internet and have adopted off-the-shelf IT technology such as TCP/IP networking, standard computer architectures, and common operating systems. Concurrently, many of the security vulnerabilities which marred IT systems have been exported to ICSs. Thus, if such systems were once considered secure because of their isolation, their use of proprietary protocols and peculiar architectures, this is no longer the case as witnessed by the growing number of increasingly sophisticated cybersecurity incidents in the last decades. As a result, nation-states, organizations, and industries have become sensitive to the security threats of ICSs, and have been adamant in their call for the development of adequate security measures to protect ICSs from security breaches. One of the key aspects which distinguish an ICS from classical IT systems is the presence of a physical process. This has lead to the apparition of a new class of novel threats which target the physical process. These datasets contain instances of such attacks and can be used to evaluate the efficiency of security measures in protecting an ICS against targeted attacks. Content These datasets include network traces collected at the ENSE3 GICS platform for the purposes of evaluating an intrusion detection system (IDS) for ICS. An IDS is a system which monitors a system in order to automatically detect security breaches. The network traces capture the behavior of an ICS test bed under attacks targeting the physical process. The test bed is implemented in GICS and is comprised of several controllers (Schneider M340/M580, Wago IPC-C6, Siemens, etc.) along with supervisory machines, engineering workstations and human machine interfaces (HMIs). Each controller sends commands and receives sensor information, via I/O interface cards, from a real-time OpenModelica simulation of a complex physical process representing a complex chemical plant. The traces contain, among other protocols, Modbus traffic carrying attacks violating the specifications of the underlying physical process. This is performed by sending a sequence of Modbus commands from workstations to controllers running the control logics which steer the process. Two types of attacks are contained in these datasets. The first type of attacks violates qualitative temporal constraints on the behavior of the physical process. Examples of such attacks include opening simultaneously two valves or stopping a motor before its due time. The second type of attacks violates quantitative temporal constraints. For example, the traces include attacks that wear a valve by quickly opening and closing it. The contents of the datasets is as follows: • One capture free from attacks and containing only legitimate traffic (capture16) • Four captures containing attacks (capture17, capture18, capure19, capture20)>
......

This dataset contains all parameters measured or determined in Burr, A., Ballot, C., Lhuissier, P., Martinerie, P., Martin, C. L., and Philip, A.: Pore morphology of polar firn around closure revealed by X-ray tomography, The Cryosphere Discuss, 2018. It contains for both Dome C and Lock In sites (Antarctic plateau) various parameters of the pores embedded in firn, and were obtained by X-ray tomography : the closed porosity ratio, connectivity index, specific surface area, surface-to-volume rati
o, but also other parameters related to the pore structure. In particular, the connectivity index was used to predict the close-off depth and density.>
......

PerSCiDO Legal notice

Legal Information
Labex Persyval-lab - Batiment IMAG
700 avenue centrale
Domaine Universitaire de Grenoble
F-38401 Saint Martin d'HèresPublication director: Marie-Christine Rousset, Persyval-lab scientific managerHosting: GRICADCreation, Development: this web site has been designed and implemented by the labex Persyval-lab.Intellectual property and website content
Data are protected by intellectual property right. As such, your usage must respect the relevant Creative Commons license selected by Authors.
PerSciDO endeavours to provide the most exact and updated information at the time of their posting on the website.
However, PerSciDO does not guarantee the exactitude, accuracy or completeness of the information provided on the site.
Information presented on the website is non-contractual and subject to change at any time.Personal data
In compliance with the French Data Protection Act no. 78-17 of 6 January 1978, as amended by Act no. 2004-801 of 6 August 2004,
you have rights to access information being kept about you and to demand the correction of this data if necessary.
To exercise this right, you can contact [contact-perscido@univ-grenoble-alpes.fr]Applicable law
This website is governed by French law. Foreign users officially accept the application of French law by visiting this site and
using all or part of the site features.Questions and comments
We invite you to address your questions and comments about this website, or to notify us of any errors, omissions, outdated
information or broken link. Thank you to send us your comments with a copy of the content to [contact-perscido@univ-grenoble-alpes.fr]

Contact us

Perscido team makes every effort to answer your questions and accommodate your requests.